Python Project

 

An application that provides API for image processing, for example – upload a picture to see how a colorblind person would see it OR apply frame to all your images, etc.

Analysing and visual data 12/09

Find and read excerpts/articles/blogs from the internet related to “best practices for coding (in R, Python or other programming languages)”. Provide a page essay on this with citations and references.

CS-340 2-1 Assignment:CRUD in MongoDB

 Please see attached for better formatting.

Overview

To understand and make use of any database system, you must learn various techniques associated with the fundamental operations of create, read, update, and delete (CRUD). For this assignment, you will begin by creating databases of document collections and performing basic reading or querying operations to retrieve specific documents from the database system. You will also gain practice updating documents and subdocuments, and removing documents from a database. You will use the mongo shell and mongoimport commands to complete this assignment.

Note: Since this is the only assignment for Module Two, it is longer than a typical assignment. Be sure to begin working on this early in the week.

Prompt

After completing the textbook reading and reviewing the mongoimport tool documentation in the module resources, complete the following tasks using the mongo shell in Apporto.

  1. The data set for this assignment, city_inspections.json, has already been loaded into the Apporto environment for you. Using the mongoimport tool, load the database “city” with documents found in the city_inspections.json file into the “inspections” collection. Complete this by typing the following commands in the Linux terminal to perform the import in the right directory:
    cd /usr/local/datasets/ #change into the Apporto directory with the data sets mongoimport --db city --collection inspections ./city_inspections.json #mongo import utility
    TIP: In any Linux systems, commands must be exact and use proper syntax and case sensitivity.
  2. Verify your load by switching to the “city” database and issuing the following queries in the mongo shell:
    1. db.inspections.find({"id" : "10021-2015-ENFO"})
    2. db.inspections.find({"result":"Out of Business"},{"business_name":1}).limit(10)
    3. Provide screenshots of the results as evidence.
  3. Using the appropriate commands in the mongo shell, insert a document to the database named “city” within the collection named “inspections.” Use the following key-value pairs as data for your document.
    KeyValueid“20032-2020-ACME”certificate_number9998888business_name“ACME Explosives”dateToday’s dateresult“Business Padlocked”sector“Explosive Retail Dealer-999”addressnumber -> 1721
    street -> Boom Road
    city -> BRONX
    zip -> 10463
    Be sure the address is inserted as a sub-document, and use the JavaScript function Date() for “Today’s date.” Verify your database creation and insertion using the findOne() function in the mongo shell. Provide a screenshot as evidence.
  4. Answer the following questions using MongoDB queries.
    1. What is the distinct list of inspection “sector” in the current inspections collection? How many are in the list? Do not count by hand.
    2. What is the difference in the date data type for the business named “AUSTIN 2012” versus your business document insertion of “Acme Explosives”?
    3. How many businesses have a “Violation Issued”? (See Value column above.)
    4. Verify by providing screenshots of the queries and results as evidence.
  5. Using the appropriate command in the mongo shell, update the document with the ID “20032-2020-ACME” in the collection “inspections” in the database “city” with the information below.
    KeyValuebusiness_name”New ACME Flowers”result”Business Re-opened”comments”Flowers after the explosion”
    Verify your database update using the appropriate find() function in the mongo shell. Provide a screenshot as evidence.
  6. Using the database “city” with documents found in the “inspections” collection, perform the tasks listed below. Verify by providing screenshots of the results as evidence.
    1. Update all the documents that contain the key-value pair “city”:”ROSEDALE” in the address subdocument by changing the zip code in the address subdocument to “76114”.
    2. Remove the first document with the key-value pair “result”:”Violation Issued.”
    3. Guidelines for Submission
      Submit a Word document containing all of your screenshots. Use a screenshot tool, such as the Snipping Tool, for your screenshots and be sure to enlarge the images in the Word document before submitting. This will help make sure that your screenshots are an appropriate size for your instructor to be able to read them. Refer to this Use Snipping Tool to Capture Screenshots guide for help with taking screenshots.

team designing

 Using the Internet, each member of your team should read at least 3 academically reviewed articles on team designing. Summarize the articles in 300 words or more. Provide appropriate references.   

Ethical Hacking week 2

 

Wk 2 Research Assignment

Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.Your assignment should be 3-4 paragraphs in length. 

Data Mining Portfolio Project

 

For this project, select an organization that has leveraged Data Mining technologies in an attempt to improve profitability or to give them a competitive advantage.

Research the organization to understand the challenges that they faced and how they intended to use Data Mining to overcome their challenges. The paper should include the following sections each called out with a header.

• Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.

• Challenges: Discuss the challenges that limited their profitability and/or competitiveness and how they planned to leverage Data Mining to overcome their challenges.

• Solution: Describe the organization’s Data Mining implementation and the benefits they realized from the implementation. What was the result of implementing Data Mining? Did they meet their objectives for fall short?

• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Preview the document

Unit 5 Project Phase 5 (Chalk and Wire)

 

Unit 5 Project Downloadable InstructionsPreview the document

This final part of your project will utilize what you learned during  the previous phases of the project into a comprehensive paper describing  the entire project. 

A this point you should have completed the first four phases of your  project.  Now you must come up with a proposal in regards to delivering  these services to the 500 homes in your area.  Write up your findings  and your network recommendations along with the pricing you will use for  customers attaching to your network.  Split the cost up between  customers so that you can have a reasonable rate of return without  charging excessive rates for your services. 

Include this information while summarizing the previous project parts  in an APA formatted paper.  Make sure you do conduct some research as  well- you want to make sure you use  industry standard terms and  technology in your paper. 

paper

 

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Build a C program that has two functions: one for encryption and one for decryption.

 Procedure

 Implement one program that has two functions: one for encryption and one for decryption. 

Encryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.) 

Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file.